Loading ...

Play interactive tourEdit tour

Analysis Report DHL Original Receipt_pdf.exe

Overview

General Information

Sample Name:DHL Original Receipt_pdf.exe
Analysis ID:433258
MD5:c376cef609a18260213571d06233ba20
SHA1:72523a0124ddd34ce6fa21901b4648311ae04b72
SHA256:c42b7b1630553baa3aeb65e40b04244910822c175e9b6cb3f7f365264171196b
Tags:AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Yara detected AgentTesla
Yara detected AgentTesla
.NET source code contains very large array initializations
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Process Tree

  • System is w10x64
  • DHL Original Receipt_pdf.exe (PID: 648 cmdline: 'C:\Users\user\Desktop\DHL Original Receipt_pdf.exe' MD5: C376CEF609A18260213571D06233BA20)
    • MSBuild.exe (PID: 1404 cmdline: 'C:\Users\user\Desktop\DHL Original Receipt_pdf.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "coco@gmicaprelam.incoco2424@gmicaprelam.in"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 4 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.DHL Original Receipt_pdf.exe.25e0000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.DHL Original Receipt_pdf.exe.25e0000.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.DHL Original Receipt_pdf.exe.25e0000.3.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.DHL Original Receipt_pdf.exe.25e0000.3.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    1.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      Networking:

                      barindex
                      Sigma detected: MSBuild connects to smtp portShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 85.187.128.34, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, Initiated: true, ProcessId: 1404, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49741

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "coco@gmicaprelam.incoco2424@gmicaprelam.in"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: DHL Original Receipt_pdf.exeVirustotal: Detection: 30%Perma Link
                      Source: DHL Original Receipt_pdf.exeReversingLabs: Detection: 41%
                      Machine Learning detection for sampleShow sources
                      Source: DHL Original Receipt_pdf.exeJoe Sandbox ML: detected
                      Source: 1.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: DHL Original Receipt_pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: Binary string: wntdll.pdbUGP source: DHL Original Receipt_pdf.exe, 00000000.00000003.228549394.0000000009BC0000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: DHL Original Receipt_pdf.exe, 00000000.00000003.228549394.0000000009BC0000.00000004.00000001.sdmp
                      Source: Binary string: mscorrc.pdb source: MSBuild.exe, 00000001.00000002.493237450.0000000002FC0000.00000002.00000001.sdmp
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_0040263E FindFirstFileA,

                      Networking:

                      barindex
                      Source: global trafficTCP traffic: 192.168.2.7:49741 -> 85.187.128.34:587
                      Source: Joe Sandbox ViewIP Address: 85.187.128.34 85.187.128.34
                      Source: Joe Sandbox ViewASN Name: A2HOSTINGUS A2HOSTINGUS
                      Source: global trafficTCP traffic: 192.168.2.7:49741 -> 85.187.128.34:587
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_012AA09A recv,
                      Source: unknownDNS traffic detected: queries for: gmicaprelam.in
                      Source: MSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: MSBuild.exe, 00000001.00000002.497225400.0000000003976000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.495800569.00000000034C2000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpString found in binary or memory: http://8isgha7nUwa6.net
                      Source: MSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: MSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpString found in binary or memory: http://LUhbZz.com
                      Source: DHL Original Receipt_pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                      Source: DHL Original Receipt_pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                      Source: DHL Original Receipt_pdf.exe, 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: MSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00405042 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

                      System Summary:

                      barindex
                      .NET source code contains very large array initializationsShow sources
                      Source: 1.2.MSBuild.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b91452745u002d9CF4u002d4278u002dBA24u002dB3A15C0CF0F0u007d/u0036D67C63Bu002d2470u002d4C65u002dBBCEu002dFB9659D2985B.csLarge array initialization: .cctor: array initializer size 11926
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: DHL Original Receipt_pdf.exe
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_012AB0BA NtQuerySystemInformation,
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_012AB089 NtQuerySystemInformation,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_0040323C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00404853
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00406131
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_73581A98
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_030A0760
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_030A9D60
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_030A0070
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_030A6B88
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_030AF4A2
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_030A7EA0
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_0310CBC8
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_0310B2BC
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_031080F0
                      Source: DHL Original Receipt_pdf.exe, 00000000.00000003.227791679.0000000009CDF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL Original Receipt_pdf.exe
                      Source: DHL Original Receipt_pdf.exe, 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamesMbeWwxGyOLOjkjGpEVHbL.exe4 vs DHL Original Receipt_pdf.exe
                      Source: DHL Original Receipt_pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                      Source: 1.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 1.2.MSBuild.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@3/4@1/1
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_012AAF3E AdjustTokenPrivileges,
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_012AAF07 AdjustTokenPrivileges,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00404356 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsvDCD5.tmpJump to behavior
                      Source: DHL Original Receipt_pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: DHL Original Receipt_pdf.exeVirustotal: Detection: 30%
                      Source: DHL Original Receipt_pdf.exeReversingLabs: Detection: 41%
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeFile read: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\DHL Original Receipt_pdf.exe 'C:\Users\user\Desktop\DHL Original Receipt_pdf.exe'
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\DHL Original Receipt_pdf.exe'
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\DHL Original Receipt_pdf.exe'
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
                      Source: Binary string: wntdll.pdbUGP source: DHL Original Receipt_pdf.exe, 00000000.00000003.228549394.0000000009BC0000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: DHL Original Receipt_pdf.exe, 00000000.00000003.228549394.0000000009BC0000.00000004.00000001.sdmp
                      Source: Binary string: mscorrc.pdb source: MSBuild.exe, 00000001.00000002.493237450.0000000002FC0000.00000002.00000001.sdmp
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_73582F60 push eax; ret
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsvDCD7.tmp\System.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFunction Chain: threadDelayed,memAlloc,memAlloc,systemQueried,systemQueried,threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,threadDelayed,systemQueried,processQueried,processQueried,systemQueried,threadDelayed,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFunction Chain: threadCreated,threadResumed,threadDelayed,threadDelayed,threadDelayed,systemQueried,systemQueried,threadDelayed,systemQueried,processQueried,processQueried,systemQueried,threadDelayed,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,systemQueried,threadDelayed,threadDelayed,threadDelayed,threadDelayed,memAlloc,memAlloc
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 689
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5368Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5368Thread sleep count: 689 > 30
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5368Thread sleep time: -20670000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5368Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00405E61 FindFirstFileA,FindClose,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_0040548B CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_0040263E FindFirstFileA,
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 30000
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 30000
                      Source: MSBuild.exe, 00000001.00000002.492496744.00000000014C0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlly
                      Source: MSBuild.exe, 00000001.00000002.497821019.0000000005C50000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
                      Source: MSBuild.exe, 00000001.00000002.492496744.00000000014C0000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
                      Source: MSBuild.exe, 00000001.00000002.497821019.0000000005C50000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
                      Source: MSBuild.exe, 00000001.00000002.497821019.0000000005C50000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
                      Source: MSBuild.exe, 00000001.00000002.497821019.0000000005C50000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 1_2_030A8B60 LdrInitializeThunk,
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00405E88 GetModuleHandleA,LoadLibraryA,GetProcAddress,
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Maps a DLL or memory area into another processShow sources
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe protection: execute and read and write
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: FDD008
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 'C:\Users\user\Desktop\DHL Original Receipt_pdf.exe'
                      Source: MSBuild.exe, 00000001.00000002.493016534.0000000001A80000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
                      Source: MSBuild.exe, 00000001.00000002.493016534.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: MSBuild.exe, 00000001.00000002.493016534.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Progman
                      Source: MSBuild.exe, 00000001.00000002.493016534.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\Desktop\DHL Original Receipt_pdf.exeCode function: 0_2_00405B88 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,StrCmpNIW,lstrlenA,
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.DHL Original Receipt_pdf.exe.25e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL Original Receipt_pdf.exe.25e0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1404, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL Original Receipt_pdf.exe PID: 648, type: MEMORY
                      Source: Yara matchFile source: 0.2.DHL Original Receipt_pdf.exe.25e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL Original Receipt_pdf.exe.25e0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1404, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.DHL Original Receipt_pdf.exe.25e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL Original Receipt_pdf.exe.25e0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 1404, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DHL Original Receipt_pdf.exe PID: 648, type: MEMORY
                      Source: Yara matchFile source: 0.2.DHL Original Receipt_pdf.exe.25e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DHL Original Receipt_pdf.exe.25e0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionAccess Token Manipulation1Disable or Modify Tools11OS Credential Dumping2File and Directory Discovery2Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
                      Default AccountsNative API11Boot or Logon Initialization ScriptsProcess Injection212Deobfuscate/Decode Files or Information1Credentials in Registry1System Information Discovery116Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerQuery Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSSecurity Software Discovery121Distributed Component Object ModelClipboard Data1Scheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion141LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsVirtualization/Sandbox Evasion141VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection212DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      DHL Original Receipt_pdf.exe30%VirustotalBrowse
                      DHL Original Receipt_pdf.exe41%ReversingLabsWin32.Trojan.AgentTesla
                      DHL Original Receipt_pdf.exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\nsvDCD7.tmp\System.dll0%MetadefenderBrowse
                      C:\Users\user\AppData\Local\Temp\nsvDCD7.tmp\System.dll0%ReversingLabs

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      1.2.MSBuild.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      0.0.DHL Original Receipt_pdf.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File
                      0.2.DHL Original Receipt_pdf.exe.400000.0.unpack100%AviraHEUR/AGEN.1137482Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      gmicaprelam.in0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://8isgha7nUwa6.net0%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://LUhbZz.com0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      gmicaprelam.in
                      85.187.128.34
                      truetrueunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1MSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://8isgha7nUwa6.netMSBuild.exe, 00000001.00000002.497225400.0000000003976000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.495800569.00000000034C2000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://DynDns.comDynDNSMSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://LUhbZz.comMSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://nsis.sf.net/NSIS_ErrorDHL Original Receipt_pdf.exefalse
                        high
                        http://nsis.sf.net/NSIS_ErrorErrorDHL Original Receipt_pdf.exefalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haMSBuild.exe, 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipDHL Original Receipt_pdf.exe, 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmp, MSBuild.exe, 00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          85.187.128.34
                          gmicaprelam.inUnited States
                          55293A2HOSTINGUStrue

                          General Information

                          Joe Sandbox Version:32.0.0 Black Diamond
                          Analysis ID:433258
                          Start date:11.06.2021
                          Start time:14:49:19
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 6m 43s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:DHL Original Receipt_pdf.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:23
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.spre.troj.spyw.evad.winEXE@3/4@1/1
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 64.7% (good quality ratio 63.6%)
                          • Quality average: 88.3%
                          • Quality standard deviation: 22%
                          HCA Information:
                          • Successful, ratio: 86%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .exe
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 13.88.21.125, 92.122.145.220, 52.147.198.201, 184.30.20.56, 20.50.102.62, 2.20.142.210, 2.20.142.209, 20.54.104.15, 20.54.7.98, 20.54.26.129, 92.122.213.247, 92.122.213.194, 20.82.210.154
                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          14:50:22API Interceptor998x Sleep call for process: MSBuild.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          85.187.128.34TNT Consigment Details_pdf.exeGet hashmaliciousBrowse
                            DHL Original Invoice_pdf.exeGet hashmaliciousBrowse
                              Sanbook Equip Machines Trading Inquiry.exeGet hashmaliciousBrowse
                                TNT Consignment Detail_pdf.exeGet hashmaliciousBrowse
                                  Consignment Details_pdf.exeGet hashmaliciousBrowse
                                    DHL delivery documents.exeGet hashmaliciousBrowse
                                      Consignment Details_pdf.exeGet hashmaliciousBrowse

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        gmicaprelam.inTNT Consigment Details_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        DHL Original Invoice_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        Sanbook Equip Machines Trading Inquiry.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        TNT Consignment Detail_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        Consignment Details_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        DHL delivery documents.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        Consignment Details_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        A2HOSTINGUSDNPr7t0GMY.exeGet hashmaliciousBrowse
                                        • 199.195.117.147
                                        lTAPQJikGw.exeGet hashmaliciousBrowse
                                        • 199.195.117.147
                                        audit-1349817595.xlsbGet hashmaliciousBrowse
                                        • 85.187.132.224
                                        TNT Consigment Details_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        DHL Original Invoice_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        Sanbook Equip Machines Trading Inquiry.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        TNT Consignment Detail_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        Consignment Details_pdf.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        SCAN_20161017_151638921_002.xlsxGet hashmaliciousBrowse
                                        • 68.66.224.18
                                        1zJU42cQVX.exeGet hashmaliciousBrowse
                                        • 68.66.224.18
                                        DHL delivery documents.exeGet hashmaliciousBrowse
                                        • 85.187.128.34
                                        GoRnrfZlAG.exeGet hashmaliciousBrowse
                                        • 199.195.117.147
                                        SCAN_20161017_151638921_002.xlsxGet hashmaliciousBrowse
                                        • 68.66.224.18
                                        XRFQX#P000001488.xlsxGet hashmaliciousBrowse
                                        • 68.66.224.18
                                        templex.exeGet hashmaliciousBrowse
                                        • 68.66.224.18
                                        e6f8edeb_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                        • 68.66.224.18
                                        Request Quote212021#P000001488.pdf.exeGet hashmaliciousBrowse
                                        • 68.66.224.18
                                        b02c0831_by_Libranalysis.exeGet hashmaliciousBrowse
                                        • 199.195.117.147
                                        Swift.pdf.exeGet hashmaliciousBrowse
                                        • 68.66.224.18
                                        vZMIGFMR.exeGet hashmaliciousBrowse
                                        • 85.187.149.197

                                        JA3 Fingerprints

                                        No context

                                        Dropped Files

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        C:\Users\user\AppData\Local\Temp\nsvDCD7.tmp\System.dllHALKBANK - Dekont_pdf.exeGet hashmaliciousBrowse
                                          Quote-TSL-1037174_4810.exeGet hashmaliciousBrowse
                                            SX365783909782021.exeGet hashmaliciousBrowse
                                              moq fob order.exeGet hashmaliciousBrowse
                                                0900000000000090000.exeGet hashmaliciousBrowse
                                                  444890321.exeGet hashmaliciousBrowse
                                                    Packing-List_00930039.exeGet hashmaliciousBrowse
                                                      2435.exeGet hashmaliciousBrowse
                                                        INVOICE.exeGet hashmaliciousBrowse
                                                          Shipment Invoice & Consignment Notification.exeGet hashmaliciousBrowse
                                                            KY4cmAI0jU.exeGet hashmaliciousBrowse
                                                              5t2CmTUhKc.exeGet hashmaliciousBrowse
                                                                8qdfmqz1PN.exeGet hashmaliciousBrowse
                                                                  New Order PO2193570O1.docGet hashmaliciousBrowse
                                                                    L2.xlsxGet hashmaliciousBrowse
                                                                      Agency Appointment VSL Tbn-Port-Appointment Letter- 2100133.xlsxGet hashmaliciousBrowse
                                                                        New Order PO2193570O1.pdf.exeGet hashmaliciousBrowse
                                                                          2320900000000.exeGet hashmaliciousBrowse
                                                                            CshpH9OSkc.exeGet hashmaliciousBrowse
                                                                              5SXTKXCnqS.exeGet hashmaliciousBrowse

                                                                                Created / dropped Files

                                                                                C:\Users\user\AppData\Local\Temp\nsvDCD6.tmp
                                                                                Process:C:\Users\user\Desktop\DHL Original Receipt_pdf.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):322013
                                                                                Entropy (8bit):7.48504577375667
                                                                                Encrypted:false
                                                                                SSDEEP:6144:8S85eJ8UxDlFbNvsxgCCAo0BuWKJE5285RLk5fO20OIesyN6Y2it:785fQFbXCfwDKTImdOIINQS
                                                                                MD5:CFDD4CCF7F714F82444F81B771F81F5A
                                                                                SHA1:CBA5F09C9F6466E2E159721D95A98C45521ACA30
                                                                                SHA-256:599B93F8209DEC77381A7EBD384369BF46974C38604BFD2689E5677E6C984C0A
                                                                                SHA-512:F21F28DB62BFBF8E0212531FF13C96C3C9D872D5EDC5F0AA5EFD94E7D6E3C496F3534F5F36E3908EB2A11F9B037C24DDF8F550997FC21CF5735222595FA589C1
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview: .r......,........................V.......q.......r..............................................................2...........................................................................................................................................................................J...................j...............................................................................................................................q...........f...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\nsvDCD7.tmp\System.dll
                                                                                Process:C:\Users\user\Desktop\DHL Original Receipt_pdf.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:modified
                                                                                Size (bytes):11776
                                                                                Entropy (8bit):5.855045165595541
                                                                                Encrypted:false
                                                                                SSDEEP:192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
                                                                                MD5:FCCFF8CB7A1067E23FD2E2B63971A8E1
                                                                                SHA1:30E2A9E137C1223A78A0F7B0BF96A1C361976D91
                                                                                SHA-256:6FCEA34C8666B06368379C6C402B5321202C11B00889401C743FB96C516C679E
                                                                                SHA-512:F4335E84E6F8D70E462A22F1C93D2998673A7616C868177CAC3E8784A3BE1D7D0BB96F2583FA0ED82F4F2B6B8F5D9B33521C279A42E055D80A94B4F3F1791E0C
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: HALKBANK - Dekont_pdf.exe, Detection: malicious, Browse
                                                                                • Filename: Quote-TSL-1037174_4810.exe, Detection: malicious, Browse
                                                                                • Filename: SX365783909782021.exe, Detection: malicious, Browse
                                                                                • Filename: moq fob order.exe, Detection: malicious, Browse
                                                                                • Filename: 0900000000000090000.exe, Detection: malicious, Browse
                                                                                • Filename: 444890321.exe, Detection: malicious, Browse
                                                                                • Filename: Packing-List_00930039.exe, Detection: malicious, Browse
                                                                                • Filename: 2435.exe, Detection: malicious, Browse
                                                                                • Filename: INVOICE.exe, Detection: malicious, Browse
                                                                                • Filename: Shipment Invoice & Consignment Notification.exe, Detection: malicious, Browse
                                                                                • Filename: KY4cmAI0jU.exe, Detection: malicious, Browse
                                                                                • Filename: 5t2CmTUhKc.exe, Detection: malicious, Browse
                                                                                • Filename: 8qdfmqz1PN.exe, Detection: malicious, Browse
                                                                                • Filename: New Order PO2193570O1.doc, Detection: malicious, Browse
                                                                                • Filename: L2.xlsx, Detection: malicious, Browse
                                                                                • Filename: Agency Appointment VSL Tbn-Port-Appointment Letter- 2100133.xlsx, Detection: malicious, Browse
                                                                                • Filename: New Order PO2193570O1.pdf.exe, Detection: malicious, Browse
                                                                                • Filename: 2320900000000.exe, Detection: malicious, Browse
                                                                                • Filename: CshpH9OSkc.exe, Detection: malicious, Browse
                                                                                • Filename: 5SXTKXCnqS.exe, Detection: malicious, Browse
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                C:\Users\user\AppData\Local\Temp\rayiid
                                                                                Process:C:\Users\user\Desktop\DHL Original Receipt_pdf.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):60209
                                                                                Entropy (8bit):4.971325407303197
                                                                                Encrypted:false
                                                                                SSDEEP:1536:5BgIe8ZXI1WsPrkvnDgpZdAk39T9ry6/zFkjpaD7lNTfa3D:5BgIe8ZtWkLgb+kNN/ya9N23D
                                                                                MD5:9E2895F6220DC4CA141D4C52B949C915
                                                                                SHA1:6FB2FB7F7FEDD604545A1F91B50AFFEFF6286278
                                                                                SHA-256:6E1FEDDECB4F11F73B42F8004BD8D6B3E22C67FDC58A80B3D87A24F11F876D79
                                                                                SHA-512:58BD0A7BBA74306B9F5C11136E26C9BA6E7C9E9D1DF60163FE8D7DD919ECD5C2CA735A7B667043C1F31CFC6E67780875BEADA5A95919854E7ECB8F918C5F1AFA
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview: U..!........H.....I...4.J.....K.....L.....M.....N.....O.....P...X.Q.....R.....S.....T.....U.....V.....W...D.X.....Y.....Z.....[.....\.....]...F.^...@._...7.`.....a.....b.....c...;.d...!.e...,.f...`.g.....h.....i.....j.....k.....l.....m...;.n...!.o...,.p...`.q.....r.....s.....t.....u.....v.....w...;.x...!.y...,.z...`.{.....|.....}.....~.....................;.....!.....,.....`.........................................;.....!.....,.....`.........................................;.....!.....,.....`...................................?.....;.....!.....,.....`.........................................;.....!.....,.....`.........................................;.....!.....,.....`.........................................;.....!.....,.....`.........................................;.....!.....,.....`.........................................;.....!.....,.....`
                                                                                C:\Users\user\AppData\Local\Temp\zjhfet5v8giw
                                                                                Process:C:\Users\user\Desktop\DHL Original Receipt_pdf.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):220672
                                                                                Entropy (8bit):7.999008107054153
                                                                                Encrypted:true
                                                                                SSDEEP:6144:i85eJ8UxDlFbNvsxgCCAo0BuWKJE5285RLk5fO20N:i85fQFbXCfwDKTImdN
                                                                                MD5:F17CDB23A72208A0CC23C168F8D13A62
                                                                                SHA1:DB703E287110E72E71CF91E856742C3AB2B8F832
                                                                                SHA-256:2608F735EEBB0A24D76CF467C3AFB1AAFC50D44B366DFD9757CB78285338EF5A
                                                                                SHA-512:0C25ECF6DCA780A1E83D2B6B80392709EF9208818258A6D3E371ACD52E4997D32045F2CCA2103ADEC9DA9323706F4E48B920164EB8622D493720DF97D865EF94
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview: ...............o..`.-yt....ag.w.^'e.(.i..^.>..iR....8..c.B^..<..O.^.j....y.e.qz..."7......`.W..<....B.Z.s.t.6K...,&..k..{d.......P...t...b.<...ex~p..C.1..}l..X.3.`....yAT'2..&.|..$..y..sJ~.....+....6+".w...[d.o.l..X.o.?..../.....z..B[{.$.......5..T.q\..R.....e.|8...?.Q.....?..o9.4W...p+.JN.8.^c..!..d.....3.6&..A!e.3..*3. ...M.Z_..X.7T..I9..Hn)..S,s....m..G.V..\..6..K...8..C.5...~%..[..xx..T$a?..Um .'.D'|...[...^to>.&.R.SX.N......>.../....=.+...W..u?j].he|.S..k.'.;...udBqV..k..7._|.}....G....7.RT.......%..o...S...... .....i.....>..U...|.\./....N...+px.D....y..C.....{..-.5BK=..k'...f..U.,....zj.K.b.."v...h.6BwHez.S.;..T,Bvt..U.....!%....(.E+.....,.x..)...........L.....t.....b..Rj.....lJ..6_K..".%d.oF.Z.......lk..B..1'+..}..{.E..D).:*.,].5$>.....$.5........g.V.y!-Ya.*.7.........}...t...kL.._.K.|..y.."?''......M8XN(.*h...K.o..K]X....;u.L.6...d...E..2}(.4..0-u.;.$'+WN+;...['..C...w.n...d....z.|.-nY...U....K.{..<....b...T....>$._.b...[...f..-..

                                                                                Static File Info

                                                                                General

                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                Entropy (8bit):7.94012628065006
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 92.16%
                                                                                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:DHL Original Receipt_pdf.exe
                                                                                File size:282745
                                                                                MD5:c376cef609a18260213571d06233ba20
                                                                                SHA1:72523a0124ddd34ce6fa21901b4648311ae04b72
                                                                                SHA256:c42b7b1630553baa3aeb65e40b04244910822c175e9b6cb3f7f365264171196b
                                                                                SHA512:0691af013f3012b999c69ef1331b011798a8b6802d6a91fba370a78a1d9dbb57dab2c1aaab1e3d89611fd0e64577640eaed9334d153b601418b9f5ed8ba845a2
                                                                                SSDEEP:6144:Ds9aphdmtsKdoFHOxDW+s6IVlzINDQCzvDj:yaphUtToFHSTs6IVl4QqvDj
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................\.........

                                                                                File Icon

                                                                                Icon Hash:b2a88c96b2ca6a72

                                                                                Static PE Info

                                                                                General

                                                                                Entrypoint:0x40323c
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x4B1AE3C6 [Sat Dec 5 22:50:46 2009 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:099c0646ea7282d232219f8807883be0

                                                                                Entrypoint Preview

                                                                                Instruction
                                                                                sub esp, 00000180h
                                                                                push ebx
                                                                                push ebp
                                                                                push esi
                                                                                xor ebx, ebx
                                                                                push edi
                                                                                mov dword ptr [esp+18h], ebx
                                                                                mov dword ptr [esp+10h], 00409130h
                                                                                xor esi, esi
                                                                                mov byte ptr [esp+14h], 00000020h
                                                                                call dword ptr [00407030h]
                                                                                push 00008001h
                                                                                call dword ptr [004070B4h]
                                                                                push ebx
                                                                                call dword ptr [0040727Ch]
                                                                                push 00000008h
                                                                                mov dword ptr [00423F58h], eax
                                                                                call 00007F21D888D09Eh
                                                                                mov dword ptr [00423EA4h], eax
                                                                                push ebx
                                                                                lea eax, dword ptr [esp+34h]
                                                                                push 00000160h
                                                                                push eax
                                                                                push ebx
                                                                                push 0041F458h
                                                                                call dword ptr [00407158h]
                                                                                push 004091B8h
                                                                                push 004236A0h
                                                                                call 00007F21D888CD51h
                                                                                call dword ptr [004070B0h]
                                                                                mov edi, 00429000h
                                                                                push eax
                                                                                push edi
                                                                                call 00007F21D888CD3Fh
                                                                                push ebx
                                                                                call dword ptr [0040710Ch]
                                                                                cmp byte ptr [00429000h], 00000022h
                                                                                mov dword ptr [00423EA0h], eax
                                                                                mov eax, edi
                                                                                jne 00007F21D888A49Ch
                                                                                mov byte ptr [esp+14h], 00000022h
                                                                                mov eax, 00429001h
                                                                                push dword ptr [esp+14h]
                                                                                push eax
                                                                                call 00007F21D888C832h
                                                                                push eax
                                                                                call dword ptr [0040721Ch]
                                                                                mov dword ptr [esp+1Ch], eax
                                                                                jmp 00007F21D888A4F5h
                                                                                cmp cl, 00000020h
                                                                                jne 00007F21D888A498h
                                                                                inc eax
                                                                                cmp byte ptr [eax], 00000020h
                                                                                je 00007F21D888A48Ch
                                                                                cmp byte ptr [eax], 00000022h
                                                                                mov byte ptr [eax+eax+00h], 00000000h

                                                                                Rich Headers

                                                                                Programming Language:
                                                                                • [EXP] VC++ 6.0 SP5 build 8804

                                                                                Data Directories

                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x9e0.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                Sections

                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x5a5a0x5c00False0.660453464674data6.41769823686IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x70000x11900x1200False0.4453125data5.18162709925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0x90000x1af980x400False0.55859375data4.70902740305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x2c0000x9e00xa00False0.45625data4.51012867721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                                                Resources

                                                                                NameRVASizeTypeLanguageCountry
                                                                                RT_ICON0x2c1900x2e8dataEnglishUnited States
                                                                                RT_DIALOG0x2c4780x100dataEnglishUnited States
                                                                                RT_DIALOG0x2c5780x11cdataEnglishUnited States
                                                                                RT_DIALOG0x2c6980x60dataEnglishUnited States
                                                                                RT_GROUP_ICON0x2c6f80x14dataEnglishUnited States
                                                                                RT_MANIFEST0x2c7100x2ccXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                                                Imports

                                                                                DLLImport
                                                                                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                                                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                                                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                                                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                                                                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                                                                                Possible Origin

                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States

                                                                                Network Behavior

                                                                                Network Port Distribution

                                                                                TCP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jun 11, 2021 14:51:45.072550058 CEST49741587192.168.2.785.187.128.34
                                                                                Jun 11, 2021 14:51:45.285763025 CEST5874974185.187.128.34192.168.2.7
                                                                                Jun 11, 2021 14:51:45.285872936 CEST49741587192.168.2.785.187.128.34
                                                                                Jun 11, 2021 14:51:45.363347054 CEST49741587192.168.2.785.187.128.34
                                                                                Jun 11, 2021 14:51:45.575809956 CEST5874974185.187.128.34192.168.2.7
                                                                                Jun 11, 2021 14:51:45.879563093 CEST5874974185.187.128.34192.168.2.7
                                                                                Jun 11, 2021 14:51:45.879584074 CEST5874974185.187.128.34192.168.2.7
                                                                                Jun 11, 2021 14:51:45.879659891 CEST49741587192.168.2.785.187.128.34
                                                                                Jun 11, 2021 14:51:45.879719019 CEST49741587192.168.2.785.187.128.34
                                                                                Jun 11, 2021 14:51:45.880007029 CEST5874974185.187.128.34192.168.2.7
                                                                                Jun 11, 2021 14:51:45.880070925 CEST49741587192.168.2.785.187.128.34

                                                                                UDP Packets

                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jun 11, 2021 14:50:03.970153093 CEST6050153192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:04.022927999 CEST53605018.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:05.271083117 CEST5377553192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:05.331259012 CEST53537758.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:05.509639978 CEST5183753192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:05.562283993 CEST53518378.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:07.053287983 CEST5541153192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:07.106240034 CEST53554118.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:07.947521925 CEST6366853192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:08.000457048 CEST53636688.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:09.659204006 CEST5464053192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:09.718081951 CEST53546408.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:10.716550112 CEST5873953192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:10.768404007 CEST53587398.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:11.632167101 CEST6033853192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:11.682315111 CEST53603388.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:13.136790991 CEST5871753192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:13.188839912 CEST53587178.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:14.307034016 CEST5976253192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:14.358202934 CEST53597628.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:15.674252033 CEST5432953192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:15.724384069 CEST53543298.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:16.529716969 CEST5805253192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:16.581316948 CEST53580528.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:19.642965078 CEST5400853192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:19.696402073 CEST53540088.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:20.816371918 CEST5945153192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:20.868047953 CEST53594518.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:22.513458967 CEST5291453192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:22.563913107 CEST53529148.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:23.931505919 CEST6456953192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:23.981811047 CEST53645698.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:24.723751068 CEST5281653192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:24.778749943 CEST53528168.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:25.568948030 CEST5078153192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:25.619395018 CEST53507818.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:26.429560900 CEST5423053192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:26.479810953 CEST53542308.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:27.385308027 CEST5491153192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:27.435691118 CEST53549118.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:28.757097960 CEST4995853192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:28.810391903 CEST53499588.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:30.982116938 CEST5086053192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:31.054970026 CEST53508608.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:47.171866894 CEST5045253192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:47.244918108 CEST53504528.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:50:59.193712950 CEST5973053192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:50:59.252208948 CEST53597308.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:11.857003927 CEST5931053192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:11.919362068 CEST53593108.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:12.697503090 CEST5191953192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:12.759356022 CEST53519198.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:13.449784040 CEST6429653192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:13.509474039 CEST53642968.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:13.950711966 CEST5668053192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:14.012115002 CEST53566808.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:14.184889078 CEST5882053192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:14.243599892 CEST53588208.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:14.583158016 CEST6098353192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:14.635221004 CEST53609838.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:15.219150066 CEST4924753192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:15.281971931 CEST53492478.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:15.743913889 CEST5228653192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:15.805583954 CEST53522868.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:16.803013086 CEST5606453192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:16.856020927 CEST53560648.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:18.288245916 CEST6374453192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:18.338809967 CEST53637448.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:19.901808977 CEST6145753192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:19.960262060 CEST53614578.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:27.433022976 CEST5836753192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:27.491926908 CEST53583678.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:44.978660107 CEST6059953192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:45.042718887 CEST53605998.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:56.938347101 CEST5957153192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:57.011588097 CEST53595718.8.8.8192.168.2.7
                                                                                Jun 11, 2021 14:51:58.344716072 CEST5268953192.168.2.78.8.8.8
                                                                                Jun 11, 2021 14:51:58.416363955 CEST53526898.8.8.8192.168.2.7

                                                                                DNS Queries

                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                Jun 11, 2021 14:51:44.978660107 CEST192.168.2.78.8.8.80x95d8Standard query (0)gmicaprelam.inA (IP address)IN (0x0001)

                                                                                DNS Answers

                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                Jun 11, 2021 14:51:45.042718887 CEST8.8.8.8192.168.2.70x95d8No error (0)gmicaprelam.in85.187.128.34A (IP address)IN (0x0001)

                                                                                SMTP Packets

                                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                                Jun 11, 2021 14:51:45.879563093 CEST5874974185.187.128.34192.168.2.7220-sg1-ts2.a2hosting.com ESMTP Exim 4.94.2 #2 Fri, 11 Jun 2021 20:51:45 +0800
                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                220 and/or bulk e-mail.
                                                                                Jun 11, 2021 14:51:45.879584074 CEST5874974185.187.128.34192.168.2.7421 sg1-ts2.a2hosting.com lost input connection

                                                                                Code Manipulations

                                                                                Statistics

                                                                                Behavior

                                                                                Click to jump to process

                                                                                System Behavior

                                                                                General

                                                                                Start time:14:50:12
                                                                                Start date:11/06/2021
                                                                                Path:C:\Users\user\Desktop\DHL Original Receipt_pdf.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\Desktop\DHL Original Receipt_pdf.exe'
                                                                                Imagebase:0x400000
                                                                                File size:282745 bytes
                                                                                MD5 hash:C376CEF609A18260213571D06233BA20
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.233952436.00000000025E0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Reputation:low

                                                                                General

                                                                                Start time:14:50:13
                                                                                Start date:11/06/2021
                                                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:'C:\Users\user\Desktop\DHL Original Receipt_pdf.exe'
                                                                                Imagebase:0xce0000
                                                                                File size:69632 bytes
                                                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.491039762.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.495614720.0000000003471000.00000004.00000001.sdmp, Author: Joe Security
                                                                                Reputation:moderate

                                                                                Disassembly

                                                                                Code Analysis

                                                                                Reset < >